TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: Doppler Share – Share one-off secrets with end-to-end encryption

90 点作者 bvallelunga超过 4 年前

11 条评论

bvallelunga超过 4 年前
Brian from Doppler here. We are an easy way to manage environment variables across projects and services. We did a Launch HN last year: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=24719722" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=24719722</a>. Since then, we&#x27;ve been hearing repeatedly from our users that they want a more secure way to share one-off secrets, like API keys, passwords, credit cards, coupons, wire info, lockbox codes, etc. This is understandable, since using Slack, SMS, or email for this leads to your secrets living unencrypted in those systems forever.<p>So we&#x27;ve made a new product to address this. It is a one-click way to share one-off secrets, end-to-end encrypted with links that auto-expire after a certain number of views and days.<p>All the encryption is done browser-side so our servers never see the raw secret or the encryption key. We use AES-GCM to encrypt your secrets, with a symmetric key derived from a cryptographically random 64 character passphrase using PBKDF2. If you want to dive deeper into how the data flows, we documented every step of the send and receive flows: <a href="https:&#x2F;&#x2F;docs.doppler.com&#x2F;docs&#x2F;share-security" rel="nofollow">https:&#x2F;&#x2F;docs.doppler.com&#x2F;docs&#x2F;share-security</a><p>We built this so anyone can use it immediately without needing to create an account or jump through any hoops.<p>Try it out: <a href="https:&#x2F;&#x2F;share.doppler.com&#x2F;s&#x2F;zg5aqzfbidn9femgnaas2wf2syedqf0sv1fvhbmn#rG5HmF6RLbxS1P2M2L8nnwuSjS2HMgsrdRFj5D7n71EWEl5OXWDXhbcv1FmI9ZB6" rel="nofollow">https:&#x2F;&#x2F;share.doppler.com&#x2F;s&#x2F;zg5aqzfbidn9femgnaas2wf2syedqf0s...</a><p>Would love to hear what you guys think!
ebfe1超过 4 年前
Cool app! Doppler looks great but i have a tiny concern about the Bugsnag 3rd party script. Unless Doppler own Bugsnag, i think for a sensitive tool like secret sharing, you should remove it.<p>Shameless plug: I made a similar tool base off another project after FirefoxSend shuts down but deploy on AWS instead of GCP :) It is hosted here if anyone wanna take a look or roll their own <a href="https:&#x2F;&#x2F;www.relaysecret.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.relaysecret.com&#x2F;</a>. The design philosophy is the same (everything is encrypted on clientside, no plaintext or password leave clients browser, minimal backend).
评论 #26280410 未加载
ppierald超过 4 年前
Similar to <a href="https:&#x2F;&#x2F;onetimesecret.com" rel="nofollow">https:&#x2F;&#x2F;onetimesecret.com</a><p>OSS which you host internally.
评论 #26280864 未加载
thefilmore超过 4 年前
I made a similar service [1] for sharing one-off secrets. The implementation is open-source [2] and the client consists of a single HTML page (about 250 lines) with no external links or resources which makes it easy to review. Nothing is sent to the server except the encrypted blob.<p>[1] <a href="https:&#x2F;&#x2F;plic.ml" rel="nofollow">https:&#x2F;&#x2F;plic.ml</a><p>[2] <a href="https:&#x2F;&#x2F;github.com&#x2F;mohd-akram&#x2F;plic" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;mohd-akram&#x2F;plic</a>
LittlePeter超过 4 年前
I am browsing docs at <a href="https:&#x2F;&#x2F;docs.doppler.com" rel="nofollow">https:&#x2F;&#x2F;docs.doppler.com</a> and I noticed that in all your examples you do not authenticate even though this is needed when interacting with doppler. In most examples the required authentication is not even one extra line of code. Why would you leave that out?<p>I have an OCD where I want the examples to be complete, sorry for that. Otherwise the service looks interesting.<p>It seems that the main doppler product is not end-to-end encrypted, is that correct?
评论 #26280076 未加载
评论 #26284598 未加载
serkanh超过 4 年前
Looks very similar to <a href="https:&#x2F;&#x2F;github.com&#x2F;pinterest&#x2F;snappass" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;pinterest&#x2F;snappass</a>
StavrosK超过 4 年前
This is what I see when I try to share a link:<p><a href="https:&#x2F;&#x2F;imgz.org&#x2F;i3EfPoDo.png" rel="nofollow">https:&#x2F;&#x2F;imgz.org&#x2F;i3EfPoDo.png</a><p>I&#x27;m using Firefox with uBlock Origin, it might be hiding your field based on its ID if it&#x27;s called &quot;share&quot; or something. I was very confused.
评论 #26280045 未加载
评论 #26279873 未加载
newscracker超过 4 年前
Curious to know if anyone uses Doppler or Doppler Share for personal use (sorta like a password manager with sharing features, which are usually not present in some password managers or are crudely implemented with other methods outside that application), and if yes, how it compares.
bvallelunga超过 4 年前
Based on inbound interest we launched an API where your apps can create Doppler Share links: <a href="https:&#x2F;&#x2F;docs.doppler.com&#x2F;reference#share-secret" rel="nofollow">https:&#x2F;&#x2F;docs.doppler.com&#x2F;reference#share-secret</a>
lotharrr超过 4 年前
Hey.. neat project!<p>From the docs at <a href="https:&#x2F;&#x2F;docs.doppler.com&#x2F;docs&#x2F;share-security" rel="nofollow">https:&#x2F;&#x2F;docs.doppler.com&#x2F;docs&#x2F;share-security</a> :<p>&gt; 2. Client-side JavaScript generates a cryptographically random 64 character passphrase &gt; 3. Client-side JavaScript generates a symmetric key using the passphrase, random salt, and 100,000 rounds of PBKDF2. &gt; .. &gt; 5. Client-side JavaScript create SHA256 hash of the passphrase &gt; 6. Client-side JavaScript sends the encrypted secret, hashed passphrase, and expiration details (days&#x2F;views) to the server.<p>Using PBKDF (or any other &quot;key-stretching&quot; algorithm) is appropriate to prevent someone from cheaply building a table that maps from potential passphrase (+salt) to the potential symmetric key, ahead of time, and then quickly testing lots of potential keys against the encrypted data. If the passphrase is not full-strength to begin with, this is an important step.<p>But.. if you then send a non-stretched, simple hash of the passphrase to the server, you&#x27;re giving up all that benefit. The server, anyone who breaks into it, or someone who can snoop on the conversation, gets to perform the fast pre-computed dictionary attack against the passphrase. You&#x27;ve prevented the ciphertext from being used as a cheap oracle, but allowed the server&#x27;s hashed-passphrase to serve that role instead.<p>The document didn&#x27;t say what character set was used for each of the 64 characters of the passphrase, but even if it&#x27;s just hex, that still gives you a 256-bit key, which is effectively infinite. So in this case, I don&#x27;t think you need the PBKDF.<p>If the passphrase were not that strong, then I&#x27;d recommend protecting both values against being used as an oracle:<p>1: run the passphrase through PBKDF (or Argon2, or bcrypt, whatever) to produce the &quot;stretched passphrase&quot; 2: hash the stretched passphrase one way to produce the encryption key, e.g. key = sha256(&quot;key:&quot; + stretchedPassphrase) 3: hash the stretched passphrase a different way to produce the hash that you reveal to the server, hash = sha256(&quot;hash:&quot; + stretchedPassphrase) 4: never reveal stretchedPassphase to anyone else, or use it directly for any other purpose<p>That way a dictionary attack against any of the revealed values are equally difficult. This is effectively the scheme we used on Firefox Accounts to protect the Sync password: <a href="https:&#x2F;&#x2F;github.com&#x2F;mozilla&#x2F;fxa-auth-server&#x2F;wiki&#x2F;onepw-protocol" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;mozilla&#x2F;fxa-auth-server&#x2F;wiki&#x2F;onepw-protoc...</a> .<p>Also note: don&#x27;t use different PBKDF round counts as a distinguisher, i.e. hash = PBKDF(rounds=10000, passphrase) and key = PBKDF(rounds=10001, passphrase). That amounts to the same thing, someone who learns the hash will get a cheap attack against the passphrase.<p>thanks for building this!
评论 #26281296 未加载
coolpanda0超过 4 年前
similar as <a href="https:&#x2F;&#x2F;github.com&#x2F;PrivateBin&#x2F;PrivateBin" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;PrivateBin&#x2F;PrivateBin</a><p>and this one has much advanced features like build up a site. <a href="https:&#x2F;&#x2F;github.com&#x2F;privapps&#x2F;" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;privapps&#x2F;</a><p>All end to end encrypted.
评论 #26291072 未加载